Security issues in collaboration platforms
CipherPoint revealed the results of its second annual survey on security issues in collaboration platforms such as Microsoft SharePoint, Office 365, and Google Apps. …
Free webinar: The basics of risk assessment and treatment according to ISO 27001
Register for this webinar to learn: The purpose of risk management Risk identification – assets, threats and vulnerabilities Risk analysis – how to assess impact …
Google open sources nogotofail, a network traffic security testing tool
In their quest to make users, the Internet, and digital devices in general more secure, a number of big Internet companies have recently announced a new collaboration that …
Extracting data from air-gapped computers via mobile phones
A group of researchers from the Department of Information Systems Engineering at Ben-Gurion University in Israel have demonstrated and detailed a technique that can allow …
Nearly 50% have been a victim of a data breach
RSA released the results of a new survey in conjunction with the Ponemon Institute highlighting consumer attitudes toward online security. Surveying more than 1,000 consumers …
227,747 new malware samples are created daily
The growth of malware appears unstoppable. In total, some 20 million new strains were created worldwide in the third quarter of the year, at a rate of 227,747 new samples …
OS X Yosemite sports serious privilege escalation bug
A Swedish researcher has unearthed a serious bug that affects the newest version of OS X – version 10.10, or Yosemite – and which could allow attackers to gain …
Targeted attacks around the globe will escalate
Experts from Trend Micro believe that targeted attacks campaigns will continue to multiply in 2015, after cybercriminals had noteworthy breaches via targeted attacks in the …
Risky file sharing practices can cause data loss and compliance violations
Organizational leadership is failing to respond to the escalating risk of ungoverned file sharing practices among their employees, and that employees routinely breach IT …
Flaw in Visa’s contactless payment system could lead to fraud
Researchers from Newcastle University have discovered a serious flaw in Visa’s contactless credit cards which could allow attackers to siphon large amounts of money off …
Researchers audit the TextSecure encrypted messaging app
A group of German researchers have audited TextSecure, the popular open source encrypted messaging application for Android, and the news is good. After fixing a particular …
Facebook embraces Tor users, sets up onion address
While in the past Facebook has occasionally blocked Tor connections because of security considerations, the company has decided it will help Tor users from now on, and …
Featured news
Resources
Don't miss
- iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)
- Unpacking the security complexity of no-code development platforms
- Researchers warn of ongoing Entra ID account takeover campaign
- LockBit panel data leak shows Chinese orgs among the most targeted
- Identifying high-risk APIs across thousands of code repositories